Articles
Ensuring Data Privacy and Security
Trevor J. MorganThe ABC’s of an Affordable Business Critical Compute
Richard BuckleWe have always heard the role of NonStop described as being best-suited platform where 100% uptime is mandatory; where the customer’s business cannot tolerate any exceptions; where nothing can be allowed to interrupt the works of the solution and where the application’s failure means the customer’s business fails.
Improve Compliance with File Integrity Monitoring
Henry FonsecaFile integrity monitoring (FIM) exists because change is inescapable for most organizations. From variations in a company’s hardware assets, software programs, configuration states, permissions, and personnel, it is the one constant within IT environments. Some of these modifications may be authorized, while others will cause concern by their unexpected nature. Because of this, FIM is considered a vital requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files and protect business assets.
Managing Latency
Keith B. EvansSecure REST Services: Real World User Examples
NuWave & TICReflections on a Virtual Users’ Group
Bill HonakerJust a few months ago, N2TUG was starting to plan for our early summer meeting. We had barely started the task when events outside our control made our usual in-person, Vendor-sponsored meeting unlikely at best. We knew we wouldn’t be able to hold it in summer, and started considering the Fall. In hindsight, even that was a bit too optimistic.
Have you ever been to Japan?
Hewlett Packard EnterpriseJapan is located in the east of the Eurasian continent, consists of five main islands from north to south, Hokkaido, Honshu, Shikoku, Kyushu and Okinawa, 6,852 islands in all. The climate classification varies from subarctic in the north to subtropical in the south, and there are four seasons. It has an area of 377,975.21 km2 with a population of 126.16 million and a time zone of UTC +9. The capital is Tokyo, Japan, located on the mainland.
Improve business performance with multi-metric scorecard analysis
Greg HuntDatabase and systems performances rely heavily on traditional Queue Theory Analysis to identify performance barriers. While this type of analysis quickly targets short-term obstructions, its methodology focuses only on a single metric during each evaluation cycle and fails to look at the comprehensive environment…
5 Best Practices for HPE NonStop File Integrity Monitoring
Steve TcherchianEasily Modernize and Expose Valuable Enscribe Data – Eliminate Data Silos
Gravic, Inc.A large European steel tube manufacturer ran its online shop floor operations on an HPE NonStop Server. To exploit the currency and value of this online, trapped, and siloed data, the manufacturer periodically generated reports on Linux Servers using a customized application and connectivity tool that remotely queries the online NonStop Enscribe database and returns the results.
Next Generation Reflex @ VIRTU-NUG
David ShieldsYikes! My very first video presentation.
I have been presenting, training, and pronouncing on the advantages of Insider Technologies product set for over 20 years, across various User Groups, customer installations, and training sessions but not one of them has involved the use of video. So why now?
Considerations for a Modern Enterprise Backup Solution
Glenn GarrahanThe need to backup, replicate, and recover data has always been historically imperative; today it has become a prioritized concern across all enterprises. Over a span of four decades, storage and backup technologies have had an evolutionary progress; one that has traversed all the way from the traditional reel-to-reel tapes, through disk drives, and their virtual avatars and ultimately, to breakthrough technologies like data deduplication and object storage that has massively reduced data redundancy and overheads…
Security Spotlight
comforteHolistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means exploring every avenue to implement a multi-pronged defensive strategy and never depending on just a single security tool or solution. Organizations that follow more holistic approaches to security are the ones best positioned to remain in compliance with internal and regulatory mandates and to prevent breaches or unauthorized access to sensitive data. They’re the ones who can best protect their intellectual property, their brand reputation, and their customers’ most sensitive data.
The Latest on LightWave ServerTM and LightWave ClientTM
Dave BelliveauIntegrate Your HPE NonStop Servers With CyberArk
Steve TcherchianCyberArk’s Brian Carpenter, Director of Business Development for CyberArk the global leader in privileged access management, and Steve Tcherchian, Chief Product Officer and Chief Information Security Officer for XYPRO Technology Corporation, a leading cybersecurity solutions company Co-presented on the topic of integrating HPE NonStop servers with CyberArk.
NonStop Pride in the Great State of Texas
Diane FunkhouserThe maximum speed limit in Texas is 85 mph. Maybe not everything moves fast in Texas, but cars and trucks certainly do. Perhaps it is just due to the geography. There is a lot of area to cover in the vast state of Texas. It is the largest state in the Continental US, although Alaska is 2.2 times larger by area, and Texas is second to California by population. The GDP of Texas is $1.6 trillion, comparable to Russia, South Korea, Tokyo or New York City.
A Successful NonStop Webinar on SQL/MX for Japanese customers
Hewlett Packard EnterpriseIn Japan, a lot of companies are working from home since the end of March when COVID-19 became more serious, and sales activities have been restricted. Under such circumstances, we held a Webinar on April 22nd promoting the NonStop database “SQL/ MX” so customers could participate from home. The Seminar title is “A recipe of system construction that never stops business”, and introduced how to build a system that cannot be stopped by using the NonStop Database.
Data Replication and Integration – Applications in Financial Services
Gravic, Inc.A major U.S. merchant provider operates a major payments transaction authorization switch – to several million small to medium-size businesses throughout the world. The merchant processes payment authorization for Visa, MasterCard, American Express, Discover, Diners Club, and other major credit and debit card client companies. The cards are issued by banks and other financial institutions for consumer purchasing at brick-and-mortar and online stores, and for withdrawing cash from ATMs. Each card transaction must be approved by the issuing bank before it can be accepted by a merchant or an ATM.
New Reflex UI: LightWave ServerTM Advantages – The Simple Way
NuWave Insider TechnologiesCOVID-19: Now is the time for Multi-Factor Authentication
Steve TcherchianNonStop Middleware: New offerings in L20.05
Sridhar NeelakantanThe L20.05 RVU is a significant release for NonStop middleware. It carries one new product and a major version upgrade of an existing product along with appropriate enhancements in others to support these two. The new product is HPE NonStop HTTP Server 2.4, a new web server, ported from the open source Apache HTTPD Server. The major version upgrade in L20.05 RVU is that of the Ported Binaries on HPE NonStop Servers, Java SE 11, called in short as NSJ 11. Both products are delivered via the commercial and telco SUTs upon ordering the RVU.
Single Sign-On and Identity and Access Management Integration on NonStop Systems – A Feasibility Study –
comforteEvery day, employees log in to many different software programs, from email to payment systems, and a myriad of other applications designed to help accomplish their daily tasks. Remembering all of the usernames and passwords associated with these products can be a real challenge with some users storing passwords insecurely, leading to serious data breaches. Single sign-on systems (SSO), i.e. moving to standardized services for digital identity, are crucial in alleviating the need for — and stress of — recalling a multitude of credentials. Providing a good SSO user experience has become more complex because the technical professionals responsible for implementing identity and access management (IAM) systems must balance user convenience against enterprise security risks.
Where has all the cash gone?
Craig LawranceCash has been having a hard time lately. With social distancing, retailers no longer appear to want your cash, they want you to keep a safe distance, but they still want your money in other ways. In the most developed countries, payment by card is well established, and there’s generally a good infrastructure to accept card payments. Globally, card schemes like Visa and MasterCard have reported a huge increase in the use of contactless payment in the stores where cards can be used, and many consumers have adopted cards in ways new to them…